The current project uses Spring Security 2.0.4 rights management framework. Login authorized by the framework to deal directly with, so it produced a log log log record after the success of the demand. One morning to find basic information on the con

In the development of RCP, we often need to table the user to the election is in some lines for certain operations, in tableview in style, we can set SWT.CHECK, but the management is often not very convenient, here on CheckboxTableViewer for a brief

The following code from the hadoop official website, but that case is very complicated, I have been simplified The following code must be run on a linux system, and has been successfully deployed installed hadoop package com.hadoop.test3; import java

There are several caveats: 1. Classpath need to add nls_charset12.jar (2) If 9i database, 10g can not be used under nls_charset12.jar, must use the corresponding version 3 below the corresponding ADDRESSTYPE database field must be uppercase [map.put

Original link: http://www.iteye.com/topic/295348 1 properties using Spring annotations to inject 1.1 How we use the annotations into the property before the class implementation: Java code public class UserManagerImpl implements UserManager { private

When there is a common spring and guice project, and the spring needs to access guice injection, this method seems to be used. (1) spring configured factory conversion <bean/> (2) GuiceBeanProviderFactory package com.plusrun.util; import com.google.

ListView dynamic loading, surely we have seen a lot of information in the Internet. I do not wordy here, provide a very simple Demo to some people in need. There are only two parts of this Demo, Activity to do shows, and a Factory to create informati

Memcached, we often need to customize some of the data, so a simple Key-Value format needs can not be completed, so we need to value this part of the object-oriented, while memcache is not a traditional object to be stored inside, with the tools it n

See original: http://wangrui.iteye.com/blog/178924. My approach is as follows: A, Model of the data members of type String, the mapping of the database field type org.springframework.orm.hibernate.support.ClobStringType / ** * Film Information Model

ConcurrentHashMap and CopyOnWriteArrayList comparison. Blog categories: Java ConcurrentHashMap ConcurrentHashMap introduced Segment, each Segment is a hashtable, the equivalent of two Hash table, and then lock in the Segment level, and increased conc

Original link: http://blog.sina.com.cn/s/blog_4b6d137b0100mu0m.html Recently, my Eclipse on the issue of Annotation is always somehow out of these problems, the most common is the @ Override Annotation on the marked. @ Override by definition expresse

Start talking about the creation of the thread. Thread to create a total of two forms: -------------------------------------------------- ------------------------------ One is inherited from the Thread class. Thread class is a concrete class that is

Original link: http://www.cnblogs.com/west-link/archive/2011/06/16/2082422.html Half did not come up with a design pattern to give the Chinese name, well, sometimes the original is still easier to understand. Simply put, Archetype design model aims t

Java RMI refers to the remote method invocation (Remote Method Invocation). It is a mechanism that allows a Java virtual machine in an object calls another object of the Java Virtual Machine on approach. You can call this method any object must imple

sqlldr guide data In Oracle database, we usually between tables in different databases to copy or move records will be used when the following methods: 1. A record of the table to export to a section separated by a semicolon insert statement, then in

<Transfer http://nonconductor.bokee.com/5042360.html > Had heard that using UDP through NAT can solve the P2P software in two client access to the Internet through the NAT to communicate the problem directly. Of course, the need for an intermediary

Recent data to see the design patterns of sudden inspiration, from the database connection associated with five kinds of design patterns, and then write the next, can be achieved, there may be some implementation in the actual production environment

struts2.1 used after Convention plugin to support zero-configuration, Convention plug-in configuration information more thoroughly completely abandoned, not only do not need to be configured using struts.xml file, do not even use the Annotation to co

Decorator paint brush painter's image understanding. Is the role of painter decorator, who was decorated by brush device role. Decorator in four roles The role of abstract components: additional features of an abstract interface. That is to be decora

Before all, we have to understand first what a Design Pattern is. A Design pattern is a form to deal with object in the OOP so that it will be easy to change or to upgrade our information system and provide a way to let some part of system vary indep

hibernate annotation-to-many cascade delete, the problem should be troubled by a lot of people, and I also was troubled for a long time, why not help us hibernate cascade delete it. Today finally solve this problem, the following example to everyone,

Listener following the last mentioned effect, there would have to talk about another interface HttpSessionListener up. Last comes the ServletContextListener, it is used to monitor Servlet Context creation and destruction of the state. Particularly in

getHibernateTemplate have a good package of some basic ways you can go directly to the use, that is, template Well, The getSession just get a data factory of the session, then most of the methods need to write, add hql statement, then execute the que

See Bowen, on the single sign-on. Quote Write your own single sign-on (SSO) service: http://blog.csdn.net/javachannel/article/details/752437 According to this blog, try a bit yourself this single sign-on solution, of course, this solution has a flaw,

Would like to add to their security control procedures, on-line search a bit, that Spring Security is the most popular, and spring with the best security framework, it was decided to try it. Using Spring Security version is 3.0.5, it is the Spring ve

The original post and discussion: http://bbs.bccn.net/thread-145129-1-1.html AOP in Spring plays an important role, made a case is to use AOP to do a login authentication. . I hope you can help, using AOP can not destroy the premise of your code to h

Unable to find the original author of the article, this can not indicate the source, the author please forgive me. If you have questions or violations to your interests, please contact me. To Hibernate2.0.3 example hibernate2.jar: Hibernate libraries

Many people on Java in the batch processing of data whether it is the right place skeptical of the idea, and by extension, so that the ORM will not be particularly suitable for bulk data processing. In fact, I think if we applied properly, can elimin

In MongoDB's official website has a very detailed introduction to the use of a variety of clients, including java, in this, where only a few more doubts to be marked: (1), how to add to the db collection? If you can not find the answer in the api doc

See the article online, very good, though, but very easy to understand English, not translated. The 2 major types of table storage engines for MySQL databases are InnoDB and MyISAM. To summarize the differences of features and performance, InnoDB is

Original Address: http://keben1983.blog.163.com/blog/static/143638081201010591157929/ This document is translated from the document [mongodb-docs-2010-10-24.pdf] in [Java Language Center] section, according to their own understanding of order is made

@ Embedded By default, JPA persistence provider assumes that each entity are persisted to its own database tables. With the @ Embedded annotation to specify a persistent field that the @ Embeddable type can be stored as an intrinsic part of the ownin

Inherit PostgreSQL implements table inheritance, the characteristics of the database designer is a very effective tool. SQL99 and later define a type inheritance feature, and we have many of the characteristics described here are different. Let's sta

Today, I have the applicationXXX.xml a configuration file into the instance, restart tomcat after deployment when the cast is wrong, wrong is the title. I have studied for a long time, because it is injected before the successful examples with refere

This document is translated from the document [mongodb-docs-2010-10-24.pdf] in [Java Language Center] section, according to their own understanding of order is made. I hope to give people like me a little help getting started with a friend, but also

1, mysql installation, set the character set utf-8 (including the database character set, and the table character set), jdbc driver with the latest 2. Hibernate configuration file (hibernate.cfg.xml), coupled with property <property name="connecti